6 pages/≈1650 words
Internal Building Security Proposal (Research Proposal Sample)
Internal Building Security Proposal source..
Internal Building Security Proposal Name: Institution: Introduction Preventing unauthorized entry into industrial buildings is both a technology and design issue. Security begins with design such that staff know where their credentials could give them access to and that design is implemented by technology. Furthermore, security is designed and implemented with usability in mind (Lippert, Walby & Steckle, 2013). This way, access controls do not impede commercial activity but still provide sufficient guarantees against pervasive intrusion. Access controls are the bedrock of security systems for industrial and commercial buildings. Through these measures, enterprises can control the flow of people between different areas of the facility without compromising function, performance, and safety. Access controls determine both the choice of surveillance systems and the techniques of protecting high-value areas (Lippert, Walby & Steckle, 2013). Depending on the type of a building, security measures respond to the varied levels of acceptable risk and assessment of vulnerabilities. For instance, while commercial buildings may have lower protections around their utility systems, industrial buildings design their security systems around providing near-total guarantees on their protection from intrusion. Threats that security planners for industrial buildings face include unauthorized entry, insider threats, disruptions to operations through vandalism or other forms of sabotage, Supervisory Control and Acquisition Data (SCADA) threats, and information security threats to physical technology assets (Harris, 2005). This author intends to propose minimum security countermeasures that, when taken alone or in concert with others, can prevent the data, support systems, equipment, and supplies that ensure smooth industrial production within facilities. These measures are not entirely layered, but are intended to be responsive to a facility’s risk and vulnerability evaluations. They ensure security by deterring, preventing, detecting, stopping, and responding to intrusions and man-made disruptions. More specifically, deterrence is achieved through visible security counter-measures such as surveillance cameras, patrols, and warning signage. Prevention or delay of the intrusion is achieved through mechanisms such as access control gates and internal security personnel, while detection is achieved through video surveillance and sensors. Response to intrusions is facilitated through panic or distress alarms, dispatch systems, in integration with plant control sensors. Access Control Access control is defined as the deliberate act of guiding individuals that are entering or exiting an area through the use of landscaping, fences, lighting, and doors (Harris, 2005). Access control is an integral part of security planning, more so in industrial buildings where intrusions can lead to damage to critical infrastructure and loss of proprietary information. Considering that industrial locations have higher than average human traffic, access control systems should provide for both spatial and role-based access. For instance, raw material suppliers should not have similar access to front-office staff who, in turn, should not have unrestricted access to high-value areas within the premises. Access control measures are typically designed to protect a facility’s assets by preventing covert and forced intrusion and, once it has occurred, detecting the intrusion and providing means for action (Harris, 2005). A typical example of how this would work is as follows: an intruder prevails over an access control door, but the intrusion is detected through sensors and other security devices. An alarm to a monitoring station dispatches security guards and, possibly, law enforcement personnel to the point of physical intrusion. To prevent these situations without impairing commercial activity, it is critical that access control systems be tamper-proof yet flexible to changing security demands. Proposed access control measures: Compound and facility human access control through the use of Control perimeters such as natural (thorny) and artificial (wire) anti-climbing fences, electric fences, rated anti-ram barriers, and security guards at points of entry/exit. These are measure of territorial re-inforcement. Traffic controls such as remote controlled gates, manual vehicle inspections, checkpoints, and parking control systems Ballistic resistant material in accessible windows and doors, including emergency doors Barriers in openings through which intruders can access such as return air grilles, culverts, and utility openings such as manholes and air intake vents Defined spaces access to which is restricted on an escalatory basis (the higher the restriction, the more the control to access) Mechanical and fail safe electromagnetic locking systems. Mechanical systems include padlocks. They should industrial strength i.e. grade 1. Electromagnetic systems can include those electronically activated by card credentials or key fobs. Control doors at general entrances and exits, administrative areas, maintenance and supply docks, pick-up stations, delivery areas server rooms or data centers, research laboratories, and other restricted areas Detection of perimeter intrusion through the following procedures Elimination of possible hiding spaces in the perimeter to provide for unobstructed spaces necessary for unimpeded observation. This can be achieved through security-aware landscaping and a mixture of motion-activated and conventional exterior lighting. Lighting controls should be protected and centralized. Classification of spaces into public, sensitive, restricted, and controlled. Surveillance (video, CCTV, sensors, guard posts) Security or intrusion alarms Detection sensors in all accessible windows and balcony, exterior, and rollup doors Deployment of personnel identification technology such as Access control based on fingerprints, ID card, and biometrics data Credential (primary and secondary) management policies that provide a predictable protocol for the issuance, retraction, and return of entry credentials. Centralization of visitor reception areas Visitor and media management through digital photo ID visitor and contractor badges with a “sponsor” or “chaperone” component Package screening Tailgating policies Data and information protection protocols Secure access (digital and physical) to hardware, networks, equipment, and information Shielding (acoustic, screen, electronic) Surveillance Surveillance is necessary if intrusion detection is to be both effective and actionable (Harris, 2005). However, in a privacy-conscious world, it is challenging to reconcile the security needs of an enterprise with the concerns of employees. Striking the right balance between the two is oftentimes fraught with the risk of ineffective environmental security or, on the other end of the spectrum, pervasive surveillance. In addition, the installation of surveillance equipment such as camera cabling, property tags, smoke sensors, and recognition locks can give an unsettling impression of a building. Proposed security surveillance measures: Regular physical security guard patrols around and within the premises Tagging property and equipment with location devices to keep a track of their physical locations. These tags can include RFID chips and useful in deterring and resolving the theft of any equipment. Installation of surveillance fire-proof and r...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Chemical Engineering: Characterization of HgS/CdS Core-Shell Nanocomposite Using Photoacoust. . .Description: Chemical Engineering Research Proposal: Characterization of HgS/CdS Core-Shell Nanocomposite Using Photoacoustic ...9 pages/≈2475 words| 10 Sources | APA | Technology | Research Proposal |
- ICT Adoption And Impacts On The Performance Of University StudentsDescription: The proposal set to explain how a research would be conducted to investigate the impact of adopting on the performance of the university students....16 pages/≈4400 words| 25 Sources | APA | Technology | Research Proposal |
- Solr vs. Elasticsearch Search EnginesDescription: Both Solr and ElasticSearch are based on the Lucene internet searcher. Lucene is a very solid and broadly conveyed web index....2 pages/≈550 words| No Sources | APA | Technology | Research Proposal |